SANS Institute to elevate Qatar’s cybersecurity capabilities as part of National Vision 2030

SANS Institute to elevate Qatar’s cybersecurity capabilities as part of National Vision 2030

SANS Doha May 2024 reinforces Qatar’s commitment towards building a digitally secure society by upskilling cybersecurity professionals.

SANS Institute, a global leader in cybersecurity training and certification, announces SANS Doha May 2024 from 18-23 May at the InterContinental Doha – the City.

The training program offers three specialised courses that will equip participants with the skills required to secure OT/IoT systems, detect and remediate incidents, and build strong strategies for cloud and on-prem platforms.

In 2023, around 18% of Qatari businesses experienced a cybersecurity breach, with five percent enduring more than five incidents, each costing an estimated average of approximately US$4.94 million

“To combat these attacks and meet evolving industry demands, SANS Doha provides a foundational framework of standardised skills and knowledge tailored for industrial cybersecurity professionals. Designed to upskill the workforce tasked with safeguarding and maintaining vital operational control systems, it ensures they are equipped to uphold safety, security and resilience against both existing and emerging cyber threats,” said Ned Baltagi, Managing Director, Middle East, Africa and Turkey, at SANS Institute.

“We aim to empower professionals to develop dynamic incident response protocols, alongside advanced abilities to detect, counter and recover from a diverse array of threats within enterprise networks. This includes adept handling of challenges posed by APT nation-state adversaries, organised crime syndicates, and hacktivists.”

SANS Doha May 2024 will offer three specialized courses through both in-person training and simultaneous live online sessions: SEC504: Hacker Tools, Techniques and Incident Handling; FOR508: Advanced Incident Response, Threat Hunting and Digital Forensics and ICS410: ICS/SCADA Security Essentials.

SEC504 covers the necessary expertise for conducting thorough incident response investigations, by developing dynamic response methodologies, threat intelligence, and defensive tactics applicable to both cloud-based and on-premises platforms.

For professionals interested in advancing their skills in threat hunting and forensic analysis, FOR508 explores investigative techniques and tools. Whether grappling with a data breach, malware incursion or any other cyber threat, a well-defined incident response plan is indispensable. Participants will learn how to effectively hunt, detect and contain various adversaries, while also learning strategies for incident remediation.

ICS410 stands as a critical course spotlighting industrial control systems (ICS) and SCADA security, both pivotal components of modern digital infrastructure. Participants will acquire cyber-secure-aware engineering practices and how to provide real-time support for control system IT/OT operations.

“We are also pleased to see the nation’s efforts towards proactively building its cyber talent capabilities and enhancing digital literacy – from early stages of education, with Qatar’s National Cyber Security Agency implementing the ‘Educational Cybersecurity Curricula’ in 170 private schools, as well as training recent graduates, to investing in the skills of existing cyber professionals and retraining employees through programs such as SANS Doha May,” continues Baltagi.

“We are happy to be partners in the nation’s commitment to securing its digital infrastructure and building a resilient cyber ecosystem, aligned with various government initiatives such as the National Cyber Security Strategy and Qatar National Vision 2030.”

SANS will also host a Community Night in Doha on May 20 – ‘Exploring the Link Between Corruption and Cybercrime’. Led by Jason Jordaan, SANS Principal Instructor, the session will explore how corruption related to cybercrime works, how organised crime groups identify targets and talk about a case study that the presenter was involved in, where a cybercrime group used corruption to pull off a major hack of several government departments.

Click below to share this article

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive